You are on page 1of 10

signal processing and the internet of things

Yuan He, Junchen Guo, and Xiaolong Zheng

From Surveillance to Digital Twin


Challenges and recent advances of signal processing
for the industrial Internet of Things

W
ith the recent advances in the Internet of Things (IoT),
the significance of information technologies to modern
industry is upgraded from purely providing surveillance-
centric functions to building a comprehensive information
framework of the industrial processes. Innovative techniques
and concepts emerge under such circumstances, e.g., digital
twin, which essentially involves data acquisition, human–
machine-product interconnection, knowledge discovery and
generation, and intelligent control, etc. Signal processing tech-
niques are crucial to the aforementioned procedures but face
unprecedented challenges when they are applied in the complex
industrial environments. In this article, we survey the promising
industrial applications of IoT technologies and discuss the chal-
lenges and recent advances in this area. We also share our early
experience with Pavatar, a real-world industrial IoT system that
enables comprehensive surveillance and remote diagnosis for
ultrahigh-voltage converter station (UHVCS). Potential research
challenges in building such a system are also categorized and dis-
cussed to illuminate the future directions.

Introduction
With the prosperity of various embedded sensors, low-power
wireless communications, and efficient signal processing tech-
niques, the IoT has achieved explosive development and prolif-
Internet OF Things—istockphoto.com/Iaremenko
eration in recent years. The IoT offers opportunities to bridge the
circuits—image licensed by ingram publishing
physical world and cyberspace, enabling fine-grained sensing
of objects and environments, continuous data gathering, com-
prehensive information fusion, deep analysis, and real-time feed-
back or control over the connected targets. According to Gart-
ner’s report, there are approximately 8 billion connected things
providing smart services in our daily life, for example, in assisted
living, building surveillance, traffic control, and environment
monitoring, etc [1].
The ever-developing IoT attracts the interest of both industry
and academia. Technology giants have already taken their steps.
Huawei, one of the world’s largest telecom equipment makers,
has devoted itself to standardizing the narrow-band IoT (NB-
Digital Object Identifier 10.1109/MSP.2018.2842228
Date of publication: 28 August 2018 IoT) as the next generation of low-power wide-area networks to

120 IEEEDownloaded
Authorized licensed use limited to: KAUST. Signal Processing Magazine
on June | September
08,2023 | from IEEE Xplore. Restrictions1053-5888/18©2018IEEE
2018UTC
at 11:34:12 apply.
fulfill its long-term strategy for building a better-connected world intensive networked videos need the upgrade of comput-
[2]. Practical IoT platforms have also been vigorously promoted ing architecture for timeliness requirements, e.g., collabora-
recently, e.g., Android Things (Google), Predix [General Electric tive edge computing [11]–[13]. On the other hand, enabling
(GE)], Azure IoT Suite (Microsoft), etc. In the meantime, aca- a resource-constrained IoT device with modern analysis
demia focuses on exploring cutting-edge techniques to boost the techniques, e.g., deep learning, can also release the pres-
application and development of the IoT, such as wireless sensing, sure of cloud infrastructure and save the network band-
indoor localization, low-power networking, backscatter commu- width [14]–[17].
nication, visible light communication, mobile computing, edge ■■ Third, new forms of communication and networking is antic-
computing, privacy and security, etc. ipated in digital twin for efficient data transmission. Recent
Among all of the promising scenarios, applying IoT technolo- advances in low-power wireless networking such as low-
gies in modern industry has great potential and practical sig- power wide-area networks [2], parallel backscatter transmis-
nificance. In 2011, Industry 4.0 is proposed to equip traditional sions [18], and software-defined low-power wireless [19] has
manufacturing with cyberphysical systems to start a new indus- drawn much attention. In this section, we emphasize the
trial revolution. GE formally put forward the concept of the research challenges and opportunities on direct communica-
Industrial Internet in 2012 [3]. GE then established the Industrial tion among heterogeneous wireless technologies that share
Internet Consortium with AT&T, Cisco, Intel, and IBM, bringing the same frequency band [20]–[23], and their upper-layer pro-
together the world’s leaders in the manufacturing, telecom, net- tocols as well as applications [24]–[26].
working, semiconductor, and computer industries, respectively, ■■ Last but not least, comprehensive data analysis and system
to promote the industrial IoT systems. diagnosis need innovative and dedicated signal processing
Due to the prosperity of IoT techniques in the past few years, methods. For example, anomaly detection and repairing of
digital twin has recently gained extensive attention. Digital twin time-series data [27], feature selection from heterogeneous
represents a dynamic digital replica of physical assets, processes, stream data [28], and fault analysis based on incomplete data
and systems, which comprehensively monitors their whole life [29] should also be well designed.
cycle. The backbone technology of digital twin is the IoT for real-
time and multisource data collection. In addition, it integrates Practical industrial IoT and signal processing
artificial intelligence and software analytics to create digital Signal processing algorithms are indispensable in almost every
simulation models that dynamically update and change along layer of industrial IoT. In this section, we survey the most recent
with their physical counterparts. Moreover, digital twin adopts research works and corresponding signal processing techniques,
modern data visualization schemes such as virtual reality (VR) to provide an overview of the current progress from sensing, net-
and augmented reality that can provide more illustrative and user- working to data analysis in industrial IoT.
friendly views.
Therefore, compared to traditional surveillance systems, digi- Wireless and battery-free sensing
tal twin provides more sensing modalities with stricter timeliness In practical industrial scenarios, many physical metrics need to
guarantees, and integrates more intelligent data analysis and be closely monitored, such as temperature and humidity, vibra-
friendlier display and interaction. With digital twin, we can not tion and noise, rotation speed, liquid leakage, etc. Although the
only better understand and predict the performance of machines advances of modern sensor technologies enable the sensibility of
and systems, but also optimize business operations for equip- more metrics, a part of these metrics cannot be provided due to
ment suppliers and consumers. However, it is a nontrivial task the complicated operational environments in real-world deploy-
to achieve such comprehensive monitoring along with require- ments that have the special characteristics that are given next.
ments such as timeliness, accuracy, scalability, and interoperabil- ■■ Requirement of nonintrusive sensing: Adding dedicated
ity in industrial IoT. We summarize potential research challenges sensors into the existing equipments costs too much because
as follows. these intrusive sensors may trigger hardware updates or
■■ First, digital twin pushes the boundary of sensing capabili- even redesigns. Hence, nonintrusive sensing methods are
ties toward the physical world. Sensing methods that moni- more preferred.
tor diverse physical metrics but rely on less resources are ■■ Large-scale sensing targets: The large number of targets to
deemed to be more practical in industrial IoT. Wireless and be monitored makes it unaffordable to deploy dedicated sen-
battery-free sensing integrating efficient techniques of data sors at all the monitoring points. Novel low-cost sensing
cleaning and signal processing can support lightweight and solutions are desired.
robust monitoring. How to extend the sensing capabilities of ■■ Limited sensing capability: Physical metrics can be very fast
wireless signals [4]–[7] and how to refine the sensing preci- changing, but most nonintrusive sensors can usually provide
sion from vulnerable readings [8]–[10] have triggered numer- undersampled data. How to fill this gap remains a challenge.
ous research motivations over the past few years. Because traditional sensors are mostly intrusive, those ap­­
■■ Second, visual sensing is extremely informative for the sur- proaches cannot be deployed with an operational machine that
veillance of physical assets and their surroundings. In digital hasn’t been initially equipped with such a capability. Other high-
twin, intensive networked cameras are deployed at a high den- resolution approaches, e.g., cameras and lasers, suffer from the
sity to provide seamless monitoring. On one hand, processing line-of-sight problem and are restricted in the application context.

IEEEDownloaded
Authorized licensed use limited to: KAUST. Signal Processing Magazine
on June | September
08,2023 | from IEEE Xplore. Restrictions apply.
2018UTC
at 11:34:12 121
Moreover, audio-based sensing is sensitive to environmental without losing their features and then leverages compressive
noises, which is therefore impractical for real-world industrial sensing (CS) to recover the high-frequency signals with the low-
applications. Wireless and battery-free sensing, e.g., radio-fre- frequency samplings. To guarantee safety, another work, Tag-
quency identification (RFID), which leverages backscattered Scan [5], utilizes the differences of RF signals when traversing
radio-frequency signals to carry information, has received plenty different kinds of liquid to classify them. In this work, a feature
of attention in the past few years, due to its low-cost, nonintru- that only relates to the liquid material is extracted from RSSI and
sive, and easy-deployment properties. A typical RFID system, as phase values with a signal propagation and attenuation model.
shown in Figure 1, consists of RFID tags that store information
in nonvolatile memories, and two-way radio transmitter–receiv- High-precision RFID localization and tracking
ers called RFID readers that send signals to tags and receive In industrial automation, object localization and tracking is one
their responses. of the most critical demands. Wireless and battery-free backscat-
Recent advances in RFID offer a promising technique for tering offers a lightweight and low-cost solution for localization
cross-modal sensing where many physical metrics are sampled and tracking of the materials in warehouses and products on pro-
with only battery-free devices and wireless signals [4]–[7]. In the duction lines. Early works achieving a median accuracy of tens of
meantime, the resolution of RFID sensing—especially battery- centimeters either rely on RSSI for distance estimation and fin-
free localization and tracking—has been well improved over the gerprint map construction, or calculate the angle of arrival (AoA)
past few years [8]–[10]. for continuous localization. Recent proposals integrate reference
tags or antenna arrays to calculate phase changes for centimeter-
Cross-modal sensing with RFID scale precision. Here we survey the most recent works on RFID
Apart from parsing the information encoded in backscatter sig- localization and tracking, which improve not only the task pre-
nals from tags, widely employed commercial RFID readers, e.g., cision but also the robustness and the practicability of sensing
ImpinJ Speedway R420, Alien ALR-9900, and Zebra FX9500, systems [8]–[10].
can interrogate the readings of received signal strength indica- A recent work, OmniTrack [8], solves the problem of the
tor (RSSI) and phase values at the frequency of approximately precision degradation caused by the phenomenon of the anten-
40 Hz. The changes in RSSI and phase offer space for the cross- na polarization when the orientation of a RFID tag changes.
modal sensing of other physical metrics, e.g., vibration [4] and To achieve centimeter-level localization and orientation of a
eccentricity [6] of rotating machines, liquid category [5], and mobile tag, OmniTrack models the linear relationship between
human–object interaction [7]. However, the relatively low inter- the tag orientation and the phase change of the backscattered
rogating frequency offered by commercial readers brings in ad- signal. To deal with high-noise and complicated multipath
ditional research challenges in industrial scenarios. environments and to soften the deployment restricts of anten-
A recent battery-free work, TagBeat, offers inexpensive and nas, Xiao et al. propose a double-tag system for accurate and
pervasive cross-modal sensing of mechanical vibration frequen- robust object localization and tracking [9]. The work demon-
cy with commercial RFID devices [4]. The phase shifts caused strates that the phase difference of closely deployed double tags
by micro vibration are too tiny to distinguish, and the high-fre- can effectively exclude the impact of undesired signals such
quency vibration is hard to capture with the limited-frequency as device noises and multipath interferences. RFind [10] man-
readings. Thus, TagBeat first magnifies weak vibration signals ages to use time-of-flight (ToF) for RFID tag localization. To

RFID Reader RFID Tag

Antenna
Antenna Carrier

RF Harvesting

Digital
Receiver
Logic
Reader
Transmitter

Backscattering

Square Wave

Figure 1. Backscattering with RFID systems.

122 IEEEDownloaded
Authorized licensed use limited to: KAUST. Signal Processing Magazine
on June | September
08,2023 | from IEEE Xplore. Restrictions apply.
2018UTC
at 11:34:12
achieve ­subcentimeter ­accuracy, a very large bandwidth of mul- Edge computing for large-scale networked video processing
tiple gigahertz is often needed in ToF-based methods, which, The networked cameras are expected to cooperate for a com-
however, is not compliant with Federal Communications prehensive understanding of the monitoring targets. How-
Commission (FCC) regulation and RFID protocols. Thus, ever, uploading all of the multimedia data stream to the cloud
RFind generates a virtual ultrawide bandwidth by importing is infeasible due to its limited processing capacity of the cloud,
extremely low-power but efficient hopping localization fre- the unpredictable latency induced by the network transmis-
quencies outside the industrial scientific medical (ISM) band sion, and the unaffordable cost of the network bandwidth. Edge
while keeping the normal communication band for powering computing, a new computation paradigm between embedded
up commercial tags. computing and cloud computing, performs data processing and
To summarize, battery-free RFID sensing offers a new analyzing at the edge of networks. Large-scale networked video
paradigm that not only can measures specific physical metrics analytics is considered the killer app of edge computing [11].
with just wireless signals, but also can provide high-precision Recent practical video analytics systems start adopting edge
results. Except extending physical modalities, improving computing to deal with large-scale networked video, although
resolution, timeliness, and reliability of battery-free RFID there has not yet been a universally standard architecture.
sensing offers prime candidates for further studies. Besides, new In [11], a practical system rocket for traffic monitoring in Bel-
nonintrusive wireless tag systems are increasingly gaining more levue, Washington, is proposed to discuss potential prospects
attention recently, e.g., LiveTag [7] designs multiple metallic of edge computing for the surveillance video processing. Model
structures of a Wi-Fi tag to disturb ambient Wi-Fi channels for predictive control is used to allocate limited computation and
information expression. Further, it leverages customized mul- network resources between the edge servers and the cloud
tiantenna beamforming algorithms to sense the human–object server. A recent edge-computing architecture [12] introduces
interaction. Moreover, we will show our preliminary explorations another offloading mode, where multiple edge servers coopera-
of designing RFID systems for real-world industrial IoT in the tively serve one camera and build a performance model with
section “Case Study: Pavatar.” the compression ratio as the input. Then it separates the NP-
hard problems of the edge server selection and the compres-
Visual sensing from intensive networked videos sion ratio selection, and solves them with heuristic algorithms.
Surveillance cameras are one of the most commonly used IoT Besides offloading and scheduling, information sparsity can be
devices in industrial IoT because the visual sensing provides leveraged to reduce computation costs among resource-con-
numerous informative clues. In modern industries, cameras are strained edge servers. The recent work ViTrack [13] proposes
deployed with a high density to seamlessly monitor the status of a spatiotemporal CS algorithm to recover the camera-level tra-
machines and the activities of workers. The characteristics of vi- jectories for the monitored vehicles by processing just 1/50 of
sual sensing in industrial IoT is as follows. the raw frames.
■■ Timeliness requirement: Video analysis usually has a strict
requirement of timeliness in modern industries. How to fulfill Practical video analytics with embedded deep learning
the real-time processing on resource-limited devices while Recent advances in deep learning, especially convolutional neu-
reducing the transmission latency remains a challenge. ral networks (CNNs), have pushed the boundaries of computer
■■ Information sparsity: Camera surveillance systems generate vision. Basically, existing CNN applications purely rely on cloud
intensive video data, but the spatiotemporal sparsity of signif- infrastructures. However, problems such as network transmission
icant information needs efficient processing. delay, expensive but limited bandwidth, user privacy and costs
■■ Seamless cooperation: Visual clues
provided by one single camera is
partial and limited, thus seamless
cooperation among the networked More Computing Power
More Data Storage Far
cameras is desired to perform com- End
Nea
plicated sensing tasks. r En
d
Visual sensing applications on a More Interactive
large-scale camera network need not More Responsive
only the optimized allocation of the Nea
Fro r En
nt-E d
computation resources but also the ef­­ nd Cloud
ficiency and the accuracy of the vision
tasks. In this section, we first intro-
duce a rising computation paradigm,
edge computing for multimedia IoT
data processing [11]–[13] and then dis- Edge
cuss efficient and accurate video analy-
sis algorithms of resource-constrained
embedded devices [14]–[17]. Figure 2. Edge computing for large-scale networked video processing.

IEEEDownloaded
Authorized licensed use limited to: KAUST. Signal Processing Magazine
on June | September
08,2023 | from IEEE Xplore. Restrictions apply.
2018UTC
at 11:34:12 123
of high-performance cloud servers make cloud-based solutions Thus, to satisfy the requirement of the low-latency performance,
infeasible for large-scale video analysis in industrial scenarios. we can adopt different strategies to optimize different modules,
One potential trend to solve this dilemma is to enable real-time e.g., the structure pruning for the deep models [14], [15] and the
deep learning directly on end devices. runtime optimization of the inference frameworks [16], [17].
In a typical CNN model, convolutional layers that extract fea- Model structure pruning methods such as DyNS [14] and Deep­
tures consume much of the executing time because of the win- IoT [15] try to eliminate the redundancy in the model parameters
dow-by-window convolutional operations, while fully connected through a three-step procedure: importance estimation, param-
layers that conduct the classification tasks take up much of the eter pruning, and model retraining. Unimportant parameters are
model weights because of the dense connections among neurons. pruned to speed up computation and save storage space. Runtime

Wi-Fi ZigBee
Link Layer 1 1 0 0 1 0 Link Layer

CTC PHY Layer CTC PHY Layer


CTC Channel
CTC Payload CTC Payload
Encoding Beacon Timing Decoding

Packet Length

CTC Symbol Packet Interval CTC


Modulation Demodulation
Tx Energy

Transmission Side Information


Control Extraction

Physical Channel
PHY Layer PHY Layer

Figure 3. The architecture of CTC.

124 IEEEDownloaded
Authorized licensed use limited to: KAUST. Signal Processing Magazine
on June | September
08,2023 | from IEEE Xplore. Restrictions apply.
2018UTC
at 11:34:12
optimization utilizes computation parallelization and pipeline the physical layer to achieve a throughput comparable to the
scheduling [16], intermediate-result caching [17], etc. to optimize original wireless technology, e.g., up to 250 kilobits/s for Zig-
the computation procedures of deep-learning inference frame- Bee. WEBee [22] is the most representative work that meticu-
works on IoT devices. lously fills the payload of a transmitted Wi-Fi frame to directly
In summary, edge computing is deemed as a promising archi- emulate ZigBee frames. The feasibility of the bit emulation is
tecture for practical visual sensing on ubiquitous surveillance ensured by a redundancy coding technology of ZigBee called
cameras, and deep-learning algorithms with amazing analy- direct sequence spread spectrum (DSSS). The inevitable dif-
sis capabilities can be tailored to edge devices. In industrial IoT, ferences of the emulated chip sequences and the predefined
effectiveness and timeliness are two dispensable, but mutually chip sequences can be tolerated by the DSSS symbol matching.
exclusive, performance indicators. Therefore, to maximize both The aforementioned CTC works have successfully estab-
of them, we believe enabling deep learning at the edge of net- lished direct communication among heterogeneous wireless
works is a promising direction. technologies in the physical layer. Protocols and applications
can be further built upon these infrastructures. A basic scenario
Cross-technology heterogeneous wireless communication is to use CTC packets as a medium access control protocol for
In digital twin for smart factories, embedded sensors with vari- the channel coordination in coexisting environments, which
ous sensing capabilities are networked together to monitor the is one of the primary intuitions of this emerging technique.
same area. These sensors might adopt heterogeneous wireless ECC [24] introduces a cross-technology clear-to-send signal to
communication technologies, such as Wi-Fi, Bluetooth, Zig- negotiate an aggregated white space for better ZigBee commu-
Bee, and long-term evolution (LTE). The characteristics of het- nication. Moreover, Crocs [25] leverages CTC to directly syn-
erogeneous networking environment are as follows. chronize Wi-Fi and ZigBee devices. To achieve a more robust
■■ Heterogeneous interference: The majority of popular wire- and accurate time synchronization, Crocs first incorporates a
less technologies share the same frequency band, e.g., short CTC beacon based on Barker code for a more accurate
2.4-GHz ISM band. Therefore, heterogeneous interfer- time alignment and then sends tim stamps via CTC transmis-
ences and collisions are very likely to occur. sions. StripComm [26] applies CTC to a more densely coex-
■■ High-density deployment: In many cases, networked sen- isting environment and faces severe challenges with dynamic
sors are densely deployed, which induces nontrivial chal- wireless interferences. To make the energy-encoding CTC more
lenges in collecting data in real time. robust against unavoidable wireless interferences, StripComm
■■ Interconnecting heterogeneous devices: Due to the com- encodes bits with Manchester coding, and decodes bits after the
plicated operating states of industrial machinery, multiple interference cancellation based on specific signal similarities.
devices need to exchange information in suit for a real-time In a nutshell, recent advances in CTC have experienced two
understanding of current states. stages, from packet-level modulation to physical-layer emula-
Today, how to organize, manage, and cooperate heteroge- tion. The validity and practicability of these approaches have
neous IoT devices is increasingly drawing attention. A simple been verified by the throughput comparable to the original
solution is to deploy a gateway with various radio interfaces for wireless in [22]. Enhancing more modern wireless technolo-
access control and information exchange among heterogeneous gies, e.g., LTE and NB-IoT with the ability of CTC, as one
devices. Possible communication bottleneck and extra hard- of the future directions of CTC, faces the new challenges of
ware cost drive researchers to explore the direct communication the bandwidth asymmetry and the mismatch of the transmis-
ability among different technologies, thus cross-technology sion rates. Moreover, facilitating the upper-layer standards and
communication (CTC) is proposed. With CTC, heterogeneous protocols to build cross-technology networks is also a very fas-
devices can directly exchange information for fast and effective cinating topic.
control and cooperation, which perfectly satisfies the timeli-
ness and interconnection requirements in industrial IoT. Data analytics
The basic idea of CTC is that, although heterogeneous The data analytics layer plays a vital role in industrial IoT to
wireless technologies can’t directly decode the packets from provide smart services. The sensing layer samples raw data of
another technology, side-channel information of wireless trans­ physical metrics, the networking layer conveys data and, fi-
missions, e.g., transmission time, beacon shifting [20], RSSI nally, the data analytics layer identifies patterns or mines the
amplitude [21] etc., can be leveraged to encode bits. These corre- principles behind. The data analytics in industrial IoT have the
sponding methods are called packet-level modulation because following characteristics.
one or more original packets should be transmitted to modu- ■■ Low quality of raw data: Due to the hardware imperfec-
late one bit. Although recent CTC works manage to improve tion or the unreliable wireless transmissions, the raw data
the throughput by deeply exploiting the coexistence environ- generated by IoT devices are usually of low quality, which
ment to encode more bits simultaneously, packet-level modula- brings challenges for the accurate analytics.
tion still offers a relatively low throughput, compared to the ■■ Multisource data: The data from multiple sensors may be
original wireless technologies. redundant and even contradictory. Obtaining the truth
Therefore, a new trend of CTC called physical-level emu- from multisource data desires more advanced signal pro-
lation tries to emulate the heterogeneous signals directly in cessing methods.

IEEEDownloaded
Authorized licensed use limited to: KAUST. Signal Processing Magazine
on June | September
08,2023 | from IEEE Xplore. Restrictions apply.
2018UTC
at 11:34:12 125
■■ Partially labeled data: In industrial scenarios, the high-fre- able data sets to learn a more generic model. Tested on an indus-
quency and continuous stream data is very difficult and trial IoT data set of a practical power distribution system, HS3M
impractical for manual labeling. Dealing with partially can achieve at least 9% gain of accuracy and 10% gain of false
labeled data is also very challenging. positive in comparison to the runner-up method.
Analyzing IoT stream data with these characteristics is In summary, advanced signal processing technologies are
deep­­ly associated with advanced signal processing algorithms, indispensable to deal with fallible, multisource, and partially
including data cleaning [27], feature selection [28], and event labeled industrial IoT data. Moreover, we believe practical data
classification and system diagnosis [29]. analytics is deeply associated with the characteristics of the target
systems, which will be addressed in the next section.
Anomaly correction of time series data
Anomaly detection (or further anomaly correction of time Case study: Pavatar
series data) is an indispensable preprocessing step for upper- In this section, we introduce our early experience with a real-
layer applications, such as event detection and fault diagnosis. world industrial IoT system, Pavatar [30]. Pavatar is an IoT sys-
In [27], Zhang, et al. suggest that simply filtering out anoma- tem for UHVCS management. The UHVCS, built at the hub
lies will damage the continuity of time-series data, and the points of the ultrahigh-voltage power grid, efficiently performs
intermittent and incomplete time series would possibly affect dc/ac transformation of clean energy, e.g., wind, solar, water,
subsequent classifiers. Different from existing rule-based re- and nuclear power. Globally connected UHVCSs are expected
pairing, e.g., the speed-constraint model and the autoregres- to construct the backbone of the Global Energy Internet (GEI),
sion model, an iterative minimum repairing (IMR) algorithm which is deemed to alleviate energy problems such as the exhaus-
based on sparse-labeled ground truth is proposed. The sparse- tion of fossil fuel, environmental pollution, and supply–demand
labeled truth points, which can be obtained by a reliable sensor imbalance. A large rotating machine called a synchronous com-
with a relatively long sampling period or manual labeling, can pensator is the core component of an UHVCS. Its critical func-
better fix continuous errors. Rather than sequentially repairing tion is to stabilize the outgoing current by generating or absorbing
one error point for just one time, an IMR algorithm iteratively reactive power, in response to unpredictable voltage fluctuations,
adjusts error points until the global convergence. and thus ensuring GEI’s stability, safety, and reliability. Clearly,
proper operation of synchronous compensators is of vital impor-
Data-driven feature selection tance to GEI. There have been various conventional solutions for
The multisource data can be redundant for upper-layer appli- power plant monitoring, e.g., manual checking and video surveil-
cations. Apart from the guidance of the physical models, data- lance. However, those solutions are generally inefficient, inaccu-
driven feature selection can improve the final performance. In rate, and costly.
[28], Li et al. point out that traditional feature selection methods Our team collaborates with the State Grid Corporation of
either consider only the informativeness of features regardless of China to launch the Pavatar project in one UHVCS located in
sample labels, or are optimized for some particular classifiers. Hunan, China. Aiming to build a digital twin of this UHVCS,
Hence, they leverage the sample labels and propose a novel infor- Pavatar monitors the entire operation process in real time and
mation greedy feature filter (IGFF) method that is independent provides decisions and support for UHVCS administrators.
from the classifiers. With rigorous mathematical proofs, IGFF The functionality of Pavatar generally includes the following
selects the optimal subset of features by maximizing mutual in- key aspects:
formation between the candidate variables and the fault labels. ■■ Comprehensive sensing of synchronous compensators and
The experiments on the real-world data set about air-handling their cooling systems, operation environments, and surround-
units of a smart building shows that, regardless of back-end clas- ing human activities.
sifiers, IGFF can achieve a much higher improvement in the clas- ■■ Heterogeneous data visualization in the form of VR.
sification accuracy than the traditional methods and the empiri- ■■ System error prediction, anomaly detection, and root-cause
cal selection. diagnosis.
Figure 4 shows the architecture of Pavatar. Pavatar col-
Event classification with partial labeled data lects data from both built-in and ambient sensors in UHVCSs.
Fault detection is an event classification problem that classifies Typical internal sensor readings include temperature, pressure,
a short time series data from multiple sources into normality vibration, rotation, etc., which provide the key metrics for deci-
or particular faults. Current methods are mainly based on su- sion making. In the surrounding environment, low-power and
pervised learning. In industrial scenarios, however, the high- battery-free sensors are deployed to sense temperature, humid-
frequency and continuous stream data are almost unlabeled. ity, noise, air quality, and liquid leakage, etc., as supplementary
Manual labeling by domain experts means considerable labor information. In addition, networked cameras are deployed to
costs, which is impractical for real-world systems. In [29], a hid- cover walkable areas. The maximum density of sensor deploy-
den structure semisupervised machine (HS3M) is proposed to ment is about 50/m2, the highest sampling frequency of internal
deal with sparsely labeled industrial IoT data. HS3M incorporates sensors is around 10 KHz, and the total data volume size per day
fully labeled data, partially labeled data, and unlabeled data with is over 1 TB. The high-frequency and big-volume stream data
a unified-format loss function, thus it can fully utilize all avail- are collected and transmitted through heterogeneous networks to

126 IEEEDownloaded
Authorized licensed use limited to: KAUST. Signal Processing Magazine
on June | September
08,2023 | from IEEE Xplore. Restrictions apply.
2018UTC
at 11:34:12
Pavatar-Power System’s Digital Twin

Application Layer
Data Visualization Event Detection System Diagnosis Video Edge

Networking Layer
Wired Network Heterogeneous Wireless Networks

Sensing Layer
Built-In Sensors Low-Power Battery-Free Cameras
Sensors Sensors

Figure 4. The architecture of Pavatar.

1
–30
RSSI (dBm)

0.8
Rotating Machinery (Rotor) –35
0.6

CDF
–40 0.4
Tag
0 2 4 6 Initial Position
0.2
Time (s) Shift 1 cm
0
0 5 10
Maximum Before Shift Time Interval (µs) × 105
∆d
Maximum After Shift of 1 mm 1
0.8
Phase (rad)

Antenna 2π 0.6
CDF

π 0.4 Initial
0 Position
Rotating Track of tag 0.2
Shift 1 cm
0 2 4 6 0
Time (s) –4 –2 0 2 4
Phase Difference (rad)

Figure 5. Due to the mismatch between the interrogation frequency and the rotation frequency, RED extracts statistic features for eccentricity
(centroid shift) detection.

fulfill upper-level applications such as data visualization, event sification of the eccentricity status [6]. As shown in Figure 5,
detection, and system diagnosis. Moreover, a three-layer edge- RED first extracts features of statistic characteristics e.g., the
computing architecture is proposed to process massive video cumulative distribution functions of the phase difference and the
data. In the following, we present some of our recent works re­­­ time interval between measured signal peaks, then constructs
garding Pavatar, which leverage advanced signal processing a Markov model to process stream data without training for a
methods to deal with the problems of industrial IoT. specific environment.

Battery-free sensing for eccentricity detection Parallel backscatter transmissions


Eccentricity, which stands for the displacement of rotating cen- RFID tags are deployed in Pavatar with the density up to 40/m2
ter, is essential for rotating machines, e.g., synchronous com- for liquid leakage detection. The dense deployments in indus-
pensators in Pavatar. Traditional techniques based on special trial IoT require new networking techniques for efficient data
embedded sensors are either hard to deploy or not practical. Our collection. Thus, we recently proposed a practical system
recent work, RFID-based eccentricity detection (RED), pro- called FlipTracer that decodes collided signals to achieve reli-
poses a battery-free RFID sensing system tailored to the clas- able parallel backscatter transmissions [18]. We found that the

IEEEDownloaded
Authorized licensed use limited to: KAUST. Signal Processing Magazine
on June | September
08,2023 | from IEEE Xplore. Restrictions apply.
2018UTC
at 11:34:12 127
transition of tag states is usually caused by the discrete signal throughput of 2 megabits/s, which is six times higher than the
flip of a single tag. Thus, instead of the direct classification, the existing methods.
states can be inferred by modeling the transition probabilities.
As shown in Figure 6, FlipTracer constructs a one-flip graph Harnessing channel state information for CTC
(OFG) in the in-phase and quadrature (IQ) domain to model Compared to Wi-Fi, ZigBee has an orders-of-magnitude small-
the transition patterns and then tracks the OFG to resolve the er maximum transmission power, and a much thinner channel
collided signals. FlipTracer is able to achieve an aggregated bandwidth. These asymmetries of different communication
standards make direct transmissions
from ZigBee to Wi-Fi challenging. Our
recent work ZigFi leverages chan-
Transition
Probability nel state information (CSI), an indica-
tor of Wi-Fi channel quality, to enable
Wi-Fi to hear low-power ZigBee trans-
missions [23]. Figure 7 shows, when
LLL LLH ZigBee transmissions interfere with
Wi-Fi preambles, the changes of CSI
HLL
LHL LHH amplitude offer a promising encoding
space. In ZigFi, a Wi-Fi device decodes
Q

HLH bytes by detecting the appearance and


HHL
HHH the absence of ZigBee signals at spe-
cific channels. By dedicatedly training
Multiple Constructing time-series data classifiers, ZigFi can
I One Cluster Identification
Tags Flip Tag Flip the OFG
achieve a throughput of 215.9 bits/s,
Amplitude

which is 18 times faster than the state


of the art.

Time Ongoing works


As mentioned previously, deep learning
Figure 6. The workflow of FlipTracer. FlipTracer first constructs OFG in the IQ domain by selecting can provide effectiveness while edge
edges with large transition probabilities, then assigns each cluster to a parallel bits representation computing can offer efficiency. A uni-
(three tags in this figure), and finally decodes the parallel bits with the OFG. versal edge-computing architecture for
real-time large-scale video analytics is
desperately needed in Pavatar. Moreover,
Without ZigBee (#20) With ZigBee (#20) data sampling in Pavatar faces a severe
35 35 problem of the category imbalance, since
the anomaly states of synchronous com-
25 25 pensators are very scarce. Therefore,
CSI (dB)

CSI (dB)

26 modern learning techniques such as on-


30
line imbalanced and hard sample mining
15 24 15 20
for multisource time-series data can be
22
30 40 50 60
10
30 40 50 60
further tailored to this problem.
5 5
1 100 200 1 100 200
Samples Samples Summary and conclusions
In this article, we surveyed and discussed
1 0.6
#20 the challenges and recent works toward
Subchannel Index

digital twin, from sensing, networking, to


10
Variance

analytics layer. We also presented Pava-


0.3 tar, a real-world IoT system for UHVCSs.
20 #13 We introduced our experience with Pava-
tar, and discussed the research issues as
30 0 well as the future directions of industrial
1 10 20 30 1 10 20 30
Subchannel Index Subchannel Index IoT. Industrial IoT is of great significance
to the innovation of traditional industry.
Figure 7. ZigFi: CTC from ZigBee to Wi-Fi. ZigFi discloses that ZigBee signals can interfere with Wi-Fi It envisions that we could automatically
preambles and change the CSI pattern of specific subchannels, e.g., channel 20. Selected subchannels monitors and comprehensively simulates
are used for CTC encoding. the factory throughout the entire life

128 IEEEDownloaded
Authorized licensed use limited to: KAUST. Signal Processing Magazine
on June | September
08,2023 | from IEEE Xplore. Restrictions apply.
2018UTC
at 11:34:12
cycle, from production and manufacturing, operation to main- [6] Y. Zheng, Y. He, M. Jin, X. heng, and Y. Liu, “RED: RFID-based eccentricity
detection for high-speed rotating machinery,” in Proc. IEEE Int. Conf. Computer
tenance, to liberate the workforce and provide credible deci- Communications, Honolulu, HI, Apr. 15–19, 2018.
sion supports for industrial operations. [7] C. Gao, Y. Li, and X. Zhang, “LiveTag: Sensing human-object interaction
through passive chipless WiFi tags,” in Proc. USENIX Networked Systems Design
and Implementation, Renton, WA, Apr. 9–11, 2018, pp. 533–546.
Acknowledgments [8] C. Jiang, Y. He, X. Zheng, and Y. Liu, “Orientation-aware RFID tracking with
This work was jointly supported by National Key R&D Program centimeter-level accuracy,” in Proc. IEEE/ACM Information Processing in Sensor
Networks, Porto, Portugal, Apr. 11–13, 2018, pp. 290–301.
of China 2017YFB1003000, the research fund from the State
[9] F. Xiao, Z. Wang, N. Ye, R. Wang, and X.-Y. Li, “One more tag enables fine-
Grid of China on “Automatic Surveillance and Remote Diagno- grained RFID localization and tracking,” IEEE/ACM Trans. Netw., vol. 26, no. 1,
sis of Synchronous Compensator,” the National Nature Science pp. 161–174, 2018.
[10] Y. Ma, N. Selby, and F. Adib, “Minding the billions: Ultra-wideband localiza-
Foundation (NSF) of China numbers 61772306 and 61672320, tion for deployed RFID tags,” in Proc. ACM Mobile Computing and Networking,
NSF of China Key Projects 61432015 and 61632008, and Chi- Snowbird, UT, Oct. 16–20, 2017, pp. 248–260.
na Postdoctoral Science Foundation number 2016M601034. [11] G. Ananthanarayanan, P. Bahl, P. Bodík, K. Chintalapudi, M. Philipose, L.
Ravindranath, and S. Sinha “Real-time video analytics: The killer app for edge
computing,” IEEE Comput., vol. 50, no. 10, pp. 58–67, 2017.
Authors [12] C. Long, Y. Cao, T. Jiang, and Q. Zhang, “Edge computing framework for
Yuan He (heyuan@tsinghua.edu.cn) received his B.E. degree cooperative video processing in multimedia IoT systems,” IEEE Trans. Multimedia,
vol. 20, no. 5, pp. 1126–1139, 2017.
in computer science and technology from the University of [13] L. Cheng, J. Wang, Z. Cao, and Y. Liu, “ViTrack: Efficient tracking on the edge
Science and Technology of China, Hefei, in 2003, his M.E. for commodity video surveillance systems,” in Proc. IEEE Int. Conf. Computer
Communications, Honolulu, HI, Apr. 15–19, 2018, pp. 1–9.
degree in computer software and theory from the Institute of
[14] Y. Guo, A. Yao, and Y. Chen, “Dynamic network surgery for efficient DNNs,”
Software, Chinese Academy of Sciences, Beijing, in 2006, in Proc. Neural Information Processing Systems, Barcelona, Spain, Dec. 5–10,
and his Ph.D. degree in computer science and engineering 2016, pp. 1379–1387.
from the Hong Kong University of Science and Technology, [15] S. Yao, Y. Zhao, A. Zhang, L. Su, and T. Abdelzaher, “DeepIoT: Compressing
deep neural network structures for sensing systems with a compressor-critic framework,”
China, in 2010. He is currently an associate professor with the in Proc. ACM Sensor Systems, Delft, The Netherlands, Nov. 5–8, 2017, pp. 43–56.
School of Software and Beijing National Research Center for [16] N. D. Lane, S. Bhattacharya, P. Georgiev, C. Forlivesi, L. Jiao, L. Qendro, and
F. Kawsar, “DeepX: A software accelerator for low-power deep learning inference
Information Science and Technology, Tsinghua University, on mobile devices,” in Proc. IEEE/ACM Information Processing in Sensor
Beijing, China. His research interests include the Internet of Networks, Vienna, Austria, Apr. 11–14, 2016, pp. 1–12.
Things, wireless networks, and mobile and ubiquitous comput- [17] A. Mathur, N. D. Lane, S. Bhattacharya, A. Boran, C. Forlivesi, and F.
Kawsar, “DeepEye: Resource efficient local execution of multiple deep vision mod-
ing. He is a Senior Member of the IEEE and a member of the els using wearable commodity hardware,” in Proc. ACM Mobile Systems,
Association for Com­­puting Machinery. Applications, and Services, Niagara Falls, NY, June 19–23, 2017, pp. 68–81.
[18] M. Jin, Y. He, X. Meng, Y. Zheng, D. Fang, and X. Chen, “FlipTracer:
Junchen Guo (juncguo@gmail.com) received his B.E. Practical parallel decoding for backscatter communication,” in Proc. ACM Mobile
degree in computer science and technology from the University Computing and Networking, Snowbird, UT, Oct. 16–20, 2017, pp. 275–287.
of Science and Technology of China, Hefei, in 2016. He is cur- [19] J. Guo, Y. He, and X. Zheng. “Pangu: Towards a software-defined architecture
for multi-function wireless sensor networks,” in Proc. IEEE Int. Conf. Parallel and
rently pursuing his Ph.D. degree in software engineering with Distributed Systems, Shenzhen, China, Dec. 15–17, 2017, pp. 730–737.
the School of Software, Tsinghua University, Beijing, China. [20] S. M. Kim and T. He, “FreeBee: Cross-technology communication via free
His research interests include the Internet of Things and mobile side-channel,” in Proc. ACM Mobile Computing and Networking, Paris, France,
Sept. 7–11, 2015, pp. 317–330.
and ubiquitous computing. [21] X. Guo, X .Zheng, and Y. He. “WiZig: Cross-technology energy communica-
Xiaolong Zheng (xiaolong@greenorbs.com) received his tion over a noisy channel,” in Proc. IEEE Int. Conf. Computer Communications,
Paris, France, May 1–4, 2017, pp. 1–9.
B.E. degree in software engineering from the Dalian University
[22] Z. Li and T. He, “WEBee: Physical-layer cross-technology communication via
of Technology, China, in 2011 and his Ph.D. degree in comput- emulation,” in Proc. ACM Mobile Computing and Networking, Snowbird, UT, Oct.
er science and engineering from the Hong Kong University of 16–20, 2017, pp. 2–14.
Science and Technology, China, in 2015. He is currently a [23] X. Guo, Y. He, X. Zheng, L. Yu, and O. Gnawali, “ZigFi: Harnessing channel
state information for cross-technology communication,” in Proc. IEEE Int. Conf.
postdoctoral research associate with the School of Software, Computer Communications, Honolulu, HI, Apr. 15–19, 2018, pp. 1–9.
Tsinghua University, Beijing, China. His research interests [24] Z. Yin, Z. Li, S. M. Kim, and T. He, “Explicit channel coordination via cross-
technology communication,” in Proceedings of ACM Mobile Systems,
include the Internet of Things, wireless networks, and ubiqui- Applications, and Services, Munich, Germany, June 10–15, 2018.
tous computing. [25] Z. Yu, C. Jiang, Y. He, X. Zheng, and X. Guo, “Crocs: Cross-technology clock
synchronization for Wifi and Zigbee,” in Proc. Embedded Wireless Systems and
Networks, Madrid, Spain, Feb. 14–16, 2018.
References [26] X. Zheng, Y. He, and X. Guo, “StripComm: Interference-resilient cross-tech-
[1] P. Middleton, T. Tsai, M. Yamaji, A. Gupta, and D. Ruebe. (2017). Forecast:
nology communication in coexisting environments,” in Proc. IEEE Int. Conf.
Internet of things – Endpoints and associated services. [Online]. Available: https://
Computer Communications, Honolulu, HI, Apr. 15–19, 2018, pp. 1–9.
www.gartner.com/doc/3840665/forecast-internet-things–endpoints.
[27] A. Zhang, S. Song, J. Wang, and P. S. Yu, “Time series data cleaning: From
[2] Huawei Technologies Co. Ltd. NB-IoT. (2018). [Online]. Available: http://developer
anomaly detection to anomaly repairing,” in Proc. Very Large Data Bases Endowment,
.huawei.com/ict/en/site-iot/product/nb-iot
Munich, Germany, Aug. 28–Sept. 1, 2017, pp. 1046–1057.
[3] P. C. Evans and M. Annunziata, “Industrial internet: Pushing the boundaries
[28] D. Li, Y. Zhou, G. Hu, and C. J. Spanos, “Optimal sensor configuration and
general electric reports,” General Electric Reports, 2012, pp. 1–37.
feature selection for AHU fault detection and diagnosis,” IEEE Trans. Ind. Informat.,
[4] L. Yang, Y. Li, Q. Lin, X.-Y. Li, and Y. Liu, “Making sense of mechanical vibra- vol. 13, no. 3, pp. 1369–1380, 2017.
tion period with sub-millisecond accuracy using backscatter signals,” in Proc. ACM
[29] Y. Zhou, R. Arghandeh, and C. J. Spanos, “Partial knowledge data-driven
Mobile Computing and Networking, New York, Oct. 3–7, 2016, pp. 16–28.
event detection for power distribution networks,” IEEE Trans. Smart Grid, 2017.
[5] J. Wang, J. Xiong, X. Chen, and D. Fang, “TagScan: Simultaneous target doi: 10.1109/TSG.2017.2681962.
imaging and material identification with commodity RFID devices,” in Proc.
ACM Mobile Computing and Networking, Snowbird, UT, Oct. 16–20, 2017, pp. [30] Tsinghua University (2018). Pavatar project. [Online]. Available: http://tns.thss
288–300. .tsinghua.edu.cn/sun/pavatar.html SP

IEEEDownloaded
Authorized licensed use limited to: KAUST. Signal Processing Magazine
on June | September
08,2023 | from IEEE Xplore. Restrictions apply.
2018UTC
at 11:34:12 129

You might also like